chore(workflow): update claude.yml for main branch and enhanced secur…#99
chore(workflow): update claude.yml for main branch and enhanced secur…#99
Conversation
ebe174a to
65769c8
Compare
- Switch event definitions to use explicit types mapping - Improves workflow clarity and future extensibility
65769c8 to
e96b36d
Compare
…d prompt handling - Add more pull request and issue event triggers - Refactor prompt preparation into separate step - Switch to anthropics/claude-code-action@v1 and update arguments - Improve system prompt and track progress for PRs
|
Claude finished @lroolle's task —— View job 🚨 CRITICAL SECURITY AUDIT - BLOCKING ISSUES FOUNDTodo List:
🔴 BLOCKING SECURITY ISSUES1. COMMAND INJECTION via Hardcoded PromptSEVERITY: CRITICAL Lines 57-58 inject a hardcoded security audit prompt into every PR: printf '%s\n' "Perform a paranoid security audit of this pull request..."Attack Vector: This forces Claude to perform security audits regardless of PR content or author intent. An attacker could:
Mitigation Required: Remove hardcoded prompt injection. Use conditional logic based on PR labels or explicit triggers. 2. Untrusted NPM Package ExecutionSEVERITY: HIGH Lines 78-91 execute "command": "npx",
"args": ["@vibeworks/barkme-mcp-server"]Attack Vectors:
Evidence Needed: Package audit, dependency pinning, checksum verification 3. Excessive GitHub PermissionsSEVERITY: HIGH Lines 29-32 grant broad write access: permissions:
contents: write # Can modify any file
pull-requests: write # Can modify PRs
issues: write # Can modify issuesRisk: Combined with NPM package execution, this creates privilege escalation path 4. Secret Exposure RiskSEVERITY: MEDIUM Lines 82-84 expose multiple secrets to external process: "BARK_DEVICES": "${{ secrets.BARK_DEVICES }}"
"BARK_SERVER": "${{ secrets.BARK_SERVER }}"Risk: If MCP server is compromised, secrets leak to attacker 🟡 HIGH-RISK FINDINGS1. Migration to Different ActionChanged from Concerns:
Required: Pin to specific commit SHA 2. Expanded Trigger SurfaceAdded Risk: More attack surface for triggering workflows with malicious payloads 3. Dynamic Tool AllowlistLine 74: Risk: Wildcards allow broad command execution including potentially dangerous subcommands
|
…ity config